A new report from Navigant Research examines the global market for distributed generation (DG) and energy storage (ES) technologies in the telecom industry, providing forecasts for capacity and revenue, segmented by technology and region, through 2027. Telecom network companies around the world

ABB’s security, monitoring and communications technology has been installed on the 1,850 km Trans-Anatolian Natural Gas Pipeline (TANAP). The first phase, ‘Gas to Eskisehir’ officially opened in summer 2018 ahead of schedule. ABB provided the security, telecommunications, SCADA main control room, containerized

A new report from Navigant Research examines how the natural gas industry is engaging in distributed system solutions, including demand response (DR) and non-pipes solutions (NPS), providing case studies and actionable recommendations for market players. Electric utilities and grid operators have relied

Power Monitors has created a solution for controlling small to mid-sized distributed energy resource (DER) implementations. “We were approached by engineers at several IOUs asking if we had a solution for controlling their customer’s small and mid-size PV and wind systems. The

MiScout 5 from Mita-Teknik is the 6th generation SCADA surveillance system supporting over 250 different wind turbine types. Using big data, it is capable of monitoring, reducing TCO and increase the wind turbines’ efficiency and earnings. When Mita-Teknik, the Danish high-tech supplier

Energy Acuity has released Water & Gas platform to focus on the utilities’ technology stack. “The new water and gas platform leverages our existing electric utility offering and provides users with actionable intelligence in the water and gas utility industry,” said VP

The global SCADA systems market is prognosticated to witness a surge in its demand during the forecast period due to the rise in industrial sector. Industrial sector uses SCADA systems as this helps in getting better efficiency, communicate system issues to help

The year in security started out with the discovery of serious vulnerabilities in the hardware level, a revelation that eroded the implicit trust the industry had on the bedrock of modern computing: microprocessors. In other parts of the security landscape, this might